This workshop will discuss the interconnections between legal returns, open-source, and closed-source information by examining each and then walking through case studies where the methods were applied. We will discuss techniques for unmasking people who are using technology to hide. Some of the topics will include facial recognition, geolocating images, advertising IDs, breach data, legal strategies, and dark web data lakes with a focus on data exploitation and data fusion. The workshop will provide a roadmap on how to complete these tasks efficiently and cost-effectively while protecting the civil rights of those we are committed to safeguarding. The workshops are for everyone from senior cyber and homicide investigators to new investigators, prosecutors, analysts, supervisors, and everyone in between. Note: You do NOT have to take Part 1 to attend Part 2.
Identify common mistakes that derail investigations from the beginning.
Understand the basic data silos and how they connect.
Understand how to pivot from one target identifier to find the next step.